General
-
Target
ef3b97f9f413597b79c619a8c38ea4f3ca0ace8b508e1b252d551b32b981e4bb
-
Size
660KB
-
Sample
230403-x2n9vagf92
-
MD5
18f1cd84b75851051552d6236d8facda
-
SHA1
140e59f4f46b7a4d28ca96b51b9206567c91ceb6
-
SHA256
ef3b97f9f413597b79c619a8c38ea4f3ca0ace8b508e1b252d551b32b981e4bb
-
SHA512
84d51080d40902a9400868eb8dc9271d21b91bb2a7004dcaf9289b939a4de41f8d923c9eb90b927c24cd9f98f3d408359c741f65b61b386ee84acd554586f427
-
SSDEEP
12288:PMr+y90k+qZ+QcDUFZpFIiUo7+oPHbSPPeZShuYj1l6AsSK:9yxZLQ0FIi+JhuEsTb
Static task
static1
Behavioral task
behavioral1
Sample
ef3b97f9f413597b79c619a8c38ea4f3ca0ace8b508e1b252d551b32b981e4bb.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
spora
176.113.115.145:4125
-
auth_value
441b39ab37774b2ca9931c31e1bc6071
Targets
-
-
Target
ef3b97f9f413597b79c619a8c38ea4f3ca0ace8b508e1b252d551b32b981e4bb
-
Size
660KB
-
MD5
18f1cd84b75851051552d6236d8facda
-
SHA1
140e59f4f46b7a4d28ca96b51b9206567c91ceb6
-
SHA256
ef3b97f9f413597b79c619a8c38ea4f3ca0ace8b508e1b252d551b32b981e4bb
-
SHA512
84d51080d40902a9400868eb8dc9271d21b91bb2a7004dcaf9289b939a4de41f8d923c9eb90b927c24cd9f98f3d408359c741f65b61b386ee84acd554586f427
-
SSDEEP
12288:PMr+y90k+qZ+QcDUFZpFIiUo7+oPHbSPPeZShuYj1l6AsSK:9yxZLQ0FIi+JhuEsTb
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-